


default search action
Raúl Monroy
Person information
SPARQL queries 
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j59]Marcos Daniel Calderón Calderón
, Miguel Angel Medina-Pérez
, Raúl Monroy
:
Improving Identification by Removing Obstructive Minutiae From Latent Fingerprints. IEEE Access 13: 7968-7985 (2025) - [j58]Juan Carlos López Pimentel, Carolina Del-Valle-Soto
, Leonardo J. Valdivia
, Raúl Monroy:
Emphasizing the Early Phases of the Software Development Process Before Deploying Smart Contracts. IEEE Access 13: 13628-13643 (2025) - [j57]Ismay Pérez-Sánchez, Miguel Angel Medina-Pérez, Raúl Monroy, Octavio Loyola-González, Andres E. Gutierrez-Rodriguez:
New Evaluation Method for Fuzzy Cluster Validity Indices. IEEE Access 13: 22728-22744 (2025) - [i4]Olga Kolesnikova, Moein Shahiki Tash, Zahra Ahani, Ameeta Agrawal, Raúl Monroy, Grigori Sidorov:
Advanced Machine Learning Techniques for Social Support Detection on Social Media. CoRR abs/2501.03370 (2025) - 2024
- [j56]Luis Daniel Samper Escalante
, Octavio Loyola-González
, Raúl Monroy
, Miguel Angel Medina-Pérez
:
Botnet Identification on Twitter: A Novel Clustering Approach Based on Similarity. IEEE Access 12: 149130-149146 (2024) - [j55]Jesús L. Llano García
, Raúl Monroy
, Víctor Adrián Sosa-Hernández
:
Neural architecture search for image super-resolution: A review on the emerging state-of-the-art. Neurocomputing 610: 128481 (2024) - [j54]Javad Khodadoust
, Raúl Monroy
, Miguel Angel Medina-Pérez, Octavio Loyola-González, Worapan Kusakunniran
, André Boller, Philipp Terhörst:
A novel indexing algorithm for latent palmprints leveraging minutiae and orientation field. Intell. Syst. Appl. 21: 200320 (2024) - [j53]Javad Khodadoust
, Raúl Monroy
, Miguel Angel Medina-Pérez
, Octavio Loyola-González
, Vutipong Areekul
, Worapan Kusakunniran
:
Enhancing latent palmprints using frequency domain analysis. Intell. Syst. Appl. 23: 200414 (2024) - [c36]Sergio Sarmiento-Rosales, Jesús Leopoldo Llano García, Jesús Guillermo Falcón-Cardona, Raúl Monroy, Manuel Iván Casillas del Llano, Víctor Adrián Sosa-Hernández:
Surrogate Modeling for Efficient Evolutionary Multi-Objective Neural Architecture Search in Super Resolution Image Restoration. IJCCI 2024: 242-249 - [c35]Carlos Efrain Quintero Narvaez
, Raúl Monroy
:
Integrating Knowledge Graph Data with Large Language Models for Explainable Inference. WSDM 2024: 1198-1199 - 2023
- [j52]Leonardo Cañete-Sifuentes
, Victor Robles, Ernestina Menasalvas
, Raúl Monroy Borja
:
Comparing Automated Machine Learning Against an Off-the-Shelf Pattern-Based Classifier in a Class Imbalance Problem: Predicting University Dropout. IEEE Access 11: 139147-139156 (2023) - [c34]Carlos Efrain Quintero Narvaez, Raúl Monroy Borja:
Zero-Knowledge Proofs for Questionnaire Result Verification in Smart Contracts. ENC 2023: 1-5 - [c33]Jesús Leopoldo Llano García, Raúl Monroy
, Víctor Adrián Sosa-Hernández:
An Experimental Protocol for Neural Architecture Search in Super-Resolution. ICCV (Workshops) 2023: 4141-4148 - [i3]Carlos Efrain Quintero Narvaez, Raúl Monroy Borja:
Zero-Knowledge Proofs for Questionnaire Result Verification in Smart Contracts. CoRR abs/2310.13618 (2023) - 2022
- [j51]Víctor Adrián Sosa-Hernández, Raúl Monroy
, Miguel Angel Medina-Pérez, Octavio Loyola-González, Francisco Herrera:
A Practical Tutorial for Decision Tree Induction: Evaluation Measures for Candidate Splits and Opportunities. ACM Comput. Surv. 54(1): 18:1-18:38 (2022) - [j50]Javad Khodadoust
, Miguel Angel Medina-Pérez
, Octavio Loyola-González
, Raúl Monroy
, Ali Mohammad Khodadoust
:
A secure and robust indexing algorithm for distorted fingerprints and latent palmprints. Expert Syst. Appl. 206: 117806 (2022) - [j49]Leonardo Cañete-Sifuentes
, Raúl Monroy
, Miguel Angel Medina-Pérez:
FT4cip: A new functional tree for classification in class imbalance problems. Knowl. Based Syst. 252: 109294 (2022) - 2021
- [j48]Ismay Pérez-Sánchez
, Bárbara Cervantes
, Miguel Angel Medina-Pérez
, Raúl Monroy
, Octavio Loyola-González
, Salvador García
, Francisco Herrera
:
An Indexing Algorithm Based on Clustering of Minutia Cylinder Codes for Fast Latent Fingerprint Identification. IEEE Access 9: 85488-85499 (2021) - [j47]Leonardo Cañete-Sifuentes
, Raúl Monroy
, Miguel Angel Medina-Pérez
:
A Review and Experimental Comparison of Multivariate Decision Trees. IEEE Access 9: 110451-110479 (2021) - [j46]Arturo Silva-Gálvez
, Raúl Monroy
, José Emmanuel Ramirez-Marquez
, Chi Zhang:
A Video Game-Crowdsourcing Approach to Discover a Player's Strategy for Problem Solution to Housing Development. IEEE Access 9: 114870-114883 (2021) - [j45]Javad Khodadoust
, Miguel Angel Medina-Pérez, Raúl Monroy
, Ali Mohammad Khodadoust
, Seyed Saeid Mirkamali:
A multibiometric system based on the fusion of fingerprint, finger-vein, and finger-knuckle-print. Expert Syst. Appl. 176: 114687 (2021) - [j44]Mariano Vargas-Santiago
, Raúl Monroy
, Chi Zhang, José Emmanuel Ramirez-Marquez, Diana Assaely León-Velasco
:
The adaptable Pareto set problem for facility location: A video game approach. Expert Syst. Appl. 186: 115682 (2021) - [j43]Danilo Valdes-Ramirez
, Miguel Angel Medina-Pérez, Raúl Monroy:
An ensemble of fingerprint matching algorithms based on cylinder codes and mtriplets for latent fingerprint identification. Pattern Anal. Appl. 24(2): 433-444 (2021) - [j42]Juan Carlos López Pimentel
, Luis Alberto Morales-Rosales
, Raúl Monroy
:
RootLogChain: Registering Log-Events in a Blockchain for Audit Issues from the Creation of the Root. Sensors 21(22): 7669 (2021) - [j41]Huaxing Zhu, Chi Zhang
, Jose Emmanuel Ramirez-Marquez
, Su Wu, Raúl Monroy
:
The Integration of Protection, Restoration, and Adaptive Flow Redistribution in Building Resilient Networked Critical Infrastructures Against Intentional Attacks. IEEE Syst. J. 15(2): 2959-2970 (2021) - [j40]Jesús L. Llano García
, Raúl Monroy, Víctor Adrián Sosa-Hernández, Carlos A. Coello Coello:
COARSE-EMOA: An indicator-based evolutionary algorithm for solving equality constrained multi-objective optimization problems. Swarm Evol. Comput. 67: 100983 (2021) - 2020
- [j39]Octavio Loyola-González
, Andrés Eduardo Gutiérrez-Rodríguez, Miguel Angel Medina-Pérez
, Raúl Monroy, José Francisco Martínez Trinidad
, Jesús Ariel Carrasco-Ochoa
, Milton García-Borroto
:
An Explainable Artificial Intelligence Model for Clustering Numerical Databases. IEEE Access 8: 52370-52384 (2020) - [j38]Jorge Rodríguez-Ruiz
, Javier Israel Mata-Sánchez, Raúl Monroy, Octavio Loyola-González
, Armando López-Cuevas:
A one-class classification approach for bot detection on Twitter. Comput. Secur. 91: 101715 (2020) - [c32]Juan Carlos López Pimentel
, Omar Rojas, Raúl Monroy:
Blockchain and off-chain: A Solution for Audit Issues in Supply Chain Systems. Blockchain 2020: 126-133
2010 – 2019
- 2019
- [j37]Octavio Loyola-González
, Raúl Monroy
, Jorge Rodríguez-Ruiz
, Armando López-Cuevas, Javier Israel Mata-Sánchez
:
Contrast Pattern-Based Classification for Bot Detection on Twitter. IEEE Access 7: 45800-45817 (2019) - [j36]Danilo Valdes-Ramirez
, Miguel Angel Medina-Pérez
, Raúl Monroy
, Octavio Loyola-González
, Jorge Rodríguez-Ruiz
, Aythami Morales
, Francisco Herrera:
A Review of Fingerprint Feature Representations and Their Applications for Latent Fingerprint Identification: Trends and Evaluation. IEEE Access 7: 48484-48499 (2019) - [j35]Leonardo Cañete-Sifuentes
, Raúl Monroy, Miguel Angel Medina-Pérez
, Octavio Loyola-González
, Francisco Vera Voronisky:
Classification Based on Multivariate Contrast Patterns. IEEE Access 7: 55744-55762 (2019) - [j34]Luis A. Trejo
, Victor Ferman
, Miguel Angel Medina-Pérez
, Fernando Miguel Arredondo Giacinti, Raúl Monroy, Jose Emmanuel Ramirez-Marquez:
DNS-ADVP: A Machine Learning Anomaly Detection and Visual Platform to Protect Top-Level Domain Name Servers Against DDoS Attacks. IEEE Access 7: 116358-116369 (2019) - [j33]Jorge Rodríguez-Ruiz, Raúl Monroy, Miguel Angel Medina-Pérez
, Octavio Loyola-González
, Bárbara Cervantes
:
Cluster validation in clustering-based one-class classification. Expert Syst. J. Knowl. Eng. 36(6) (2019) - [j32]Jorge Rodríguez-Ruiz
, Miguel Angel Medina-Pérez
, Raúl Monroy
, Octavio Loyola-González
:
A survey on minutiae-based palmprint feature representations, and a full analysis of palmprint feature representation role in latent identification performance. Expert Syst. Appl. 131: 30-44 (2019) - [j31]Octavio Loyola-González
, Armando López-Cuevas, Miguel Angel Medina-Pérez
, Benito Camiña, Jose Emmanuel Ramirez-Marquez, Raúl Monroy
:
Fusing pattern discovery and visual analytics approaches in tweet propagation. Inf. Fusion 46: 91-101 (2019) - [j30]José Benito Camiña, Miguel Angel Medina-Pérez
, Raúl Monroy
, Octavio Loyola-González
, Luis Angel Pereyra Villanueva, Luis Carlos González-Gurrola:
Bagging-RandomMiner: a one-class classifier for file access-based masquerade detection. Mach. Vis. Appl. 30(5): 959-974 (2019) - [j29]Octavio Loyola-González
, Miguel Angel Medina-Pérez
, Dayton Hernández-Tamayo, Raúl Monroy
, Jesús Ariel Carrasco-Ochoa
, Milton García-Borroto
:
A Pattern-Based Approach for Detecting Pneumatic Failures on Temporary Immersion Bioreactors. Sensors 19(2): 414 (2019) - [j28]Carolina Del-Valle-Soto
, J. Carlos Mex-Perera
, Ivan Aldaya, Fernando Lezama
, Juan Arturo Nolazco-Flores
, Raúl Monroy
:
New Detection Paradigms to Improve Wireless Sensor Network Performance under Jamming Attacks. Sensors 19(11): 2489 (2019) - [c31]Danilo Valdes-Ramirez
, Miguel Angel Medina-Pérez
, Raúl Monroy
:
Stacking Fingerprint Matching Algorithms for Latent Fingerprint Identification. CIARP 2019: 230-240 - 2018
- [j27]Bárbara Cervantes
, Raúl Monroy
, Miguel Angel Medina-Pérez
, Miguel González-Mendoza
, Jose Emmanuel Ramirez-Marquez:
Some features speak loud, but together they all speak louder: A study on the correlation between classification error and feature usage in decision-tree classification ensembles. Eng. Appl. Artif. Intell. 67: 270-282 (2018) - [j26]Jorge Rodríguez-Ruiz
, Miguel Angel Medina-Pérez
, Andrés Eduardo Gutiérrez-Rodríguez, Raúl Monroy
, Hugo Terashima-Marín
:
Cluster validation using an ensemble of supervised classifiers. Knowl. Based Syst. 145: 134-144 (2018) - [j25]Armando López-Cuevas, Miguel Angel Medina-Pérez
, Raúl Monroy
, Jose Emmanuel Ramirez-Marquez
, Luis A. Trejo:
FiToViz: A Visualisation Approach for Real-Time Risk Situation Awareness. IEEE Trans. Affect. Comput. 9(3): 372-382 (2018) - [c30]Octavio Loyola-González, Raúl Monroy
, Miguel Angel Medina-Pérez
, Bárbara Cervantes
, José Ernesto Grimaldo-Tijerina:
An Approach Based on Contrast Patterns for Bot Detection on Web Log Files. MICAI (1) 2018: 276-285 - 2017
- [j24]Victor Ferman, Dieter Hutter
, Raúl Monroy
:
A Model Checker for the Verification of Browser Based Protocols. Computación y Sistemas 21(1) (2017) - [j23]Ari Yair Barrera-Animas
, Luis A. Trejo
, Miguel Angel Medina-Pérez
, Raúl Monroy
, José Benito Camiña
, Fernando Godínez:
Online personal risk detection based on behavioural and physiological patterns. Inf. Sci. 384: 281-297 (2017) - [j22]Octavio Loyola-González
, Miguel Angel Medina-Pérez
, José Fco. Martínez-Trinidad
, Jesús Ariel Carrasco-Ochoa
, Raúl Monroy
, Milton García-Borroto
:
PBC4cip: A new contrast pattern-based classifier for class imbalance problems. Knowl. Based Syst. 115: 100-109 (2017) - [j21]Carolina Del-Valle-Soto
, J. Carlos Mex-Perera
, Raúl Monroy
, Juan Arturo Nolazco-Flores
:
MPH-M, AODV-M and DSR-M Performance Evaluation under Jamming Attacks. Sensors 17(7): 1573 (2017) - [j20]Miguel Angel Medina-Pérez
, Raúl Monroy
, José Benito Camiña
, Milton García-Borroto
:
Bagging-TPMiner: a classifier ensemble for masquerader detection based on typical objects. Soft Comput. 21(3): 557-569 (2017) - 2016
- [j19]Israel Becerra
, Rafael Murrieta-Cid
, Raúl Monroy
, Seth Hutchinson
, Jean-Paul Laumond:
Maintaining strong mutual visibility of an evader moving over the reduced visibility graph. Auton. Robots 40(2): 395-423 (2016) - [j18]Roberto Alonso
, Raúl Monroy
, Luis A. Trejo
:
Mining IP to Domain Name Interactions to Detect DNS Flood Attacks on Recursive DNS Servers. Sensors 16(8): 1311 (2016) - [j17]Jorge Rodríguez-Ruiz
, Ari Yair Barrera-Animas
, Luis A. Trejo
, Miguel Angel Medina-Pérez
, Raúl Monroy
:
Ensemble of One-Class Classifiers for Personal Risk Detection Based on Wearable Sensor Data. Sensors 16(10): 1619 (2016) - [j16]José Benito Camiña
, Raúl Monroy
, Luis A. Trejo, Miguel Angel Medina-Pérez
:
Temporal and Spatial Locality: An Abstraction for Masquerade Detection. IEEE Trans. Inf. Forensics Secur. 11(9): 2036-2051 (2016) - [i2]Roberto Alonso, Raúl Monroy, Eduardo Aguirre:
On the Phase Transition of Finding a Biclique in a larger Bipartite Graph. CoRR abs/1609.05876 (2016) - 2015
- [j15]Bárbara Cervantes, Miguel González-Mendoza, Raúl Monroy, Christian Eduardo Galdámez Blanco, Eduardo Ismael García Pérez:
Hacia la construcción de una herramienta para la creación de bitácoras para Android. Res. Comput. Sci. 93: 111-120 (2015) - [j14]Carolina Del-Valle-Soto
, J. Carlos Mex-Perera
, Raúl Monroy
, Juan Arturo Nolazco-Flores
:
On the Routing Protocol Influence on the Resilience of Wireless Sensor Networks to Jamming Attacks. Sensors 15(4): 7619-7649 (2015) - 2014
- [j13]Benito Camiña
, Carlos Arturo Hernández-Gracidas
, Raúl Monroy
, Luis A. Trejo
:
The Windows-Users and -Intruder simulations Logs dataset (WUIL): An experimental framework for masquerade detection mechanisms. Expert Syst. Appl. 41(3): 919-930 (2014) - [c29]José Benito Camiña
, Jorge Rodríguez-Ruiz
, Raúl Monroy
:
Towards a Masquerade Detection System Based on User's Tasks. RAID 2014: 447-465 - 2013
- [j12]Roberto Alonso, Raúl Monroy:
Es NP-completo calcular la comunidad entre los objetos sobre los que una colección de agentes ha realizado una acción. Computación y Sistemas 17(4) (2013) - [i1]Dieter Hutter, Raúl Monroy:
Strand-Based Approach to Patch Security Protocols. CoRR abs/1308.1888 (2013) - 2012
- [j11]Raúl Monroy:
Editorial. Computación y Sistemas 16(4) (2012) - [j10]Iván S. Razo-Zapata
, J. Carlos Mex-Perera
, Raúl Monroy Borja
:
Masquerade attacks based on user's profile. J. Syst. Softw. 85(11): 2640-2651 (2012) - [j9]Raúl Monroy:
Editorial. Polibits 46: 3 (2012) - [j8]Karen A. García, Raúl Monroy
, Luis A. Trejo
, J. Carlos Mex-Perera
, Eduardo Aguirre-Bermúdez
:
Analyzing Log Files for Postmortem Intrusion Detection. IEEE Trans. Syst. Man Cybern. Part C 42(6): 1690-1704 (2012) - 2011
- [c28]Juan Carlos López Pimentel
, Raúl Monroy
, Víctor Fernando Ramos Fon Bon:
Symmetric Cryptography Protocol for Signing and Authenticating Digital Documents. ICDIPC (1) 2011: 9-23 - [c27]Benito Camiña
, Raúl Monroy
, Luis A. Trejo
, Erika Sánchez:
Towards Building a Masquerade Detection Method Based on User File System Navigation. MICAI (1) 2011: 174-186 - 2010
- [c26]Israel Becerra
, Rafael Murrieta-Cid
, Raúl Monroy
:
Evader surveillance under incomplete information. ICRA 2010: 5511-5518 - [c25]Raúl Monroy
:
Some Encounters on the Productive Use of a Failed Proof Attempt or a Counterexample. MICAI (1) 2010: 1-12
2000 – 2009
- 2009
- [j7]Raúl Monroy
, Alan Bundy, Ian Green:
On Process Equivalence = Equation Solving in CCS. J. Autom. Reason. 43(1): 53-80 (2009) - [c24]Dieter Hutter
, Raúl Monroy
:
On the Automated Correction of Protocols with Improper Message Encoding. ARSPA-WITS 2009: 138-154 - [e2]Arturo Hernández Aguirre, Raúl Monroy Borja, Carlos A. Reyes García:
MICAI 2009: Advances in Artificial Intelligence, 8th Mexican International Conference on Artificial Intelligence, Guanajuato, Mexico, November 9-13, 2009. Proceedings. Lecture Notes in Computer Science 5845, Springer 2009, ISBN 978-3-642-05257-6 [contents] - 2008
- [j6]Juan Carlos López Pimentel, Raúl Monroy:
Formal Support to Security Protocol Development: A Survey. Computación y Sistemas 12(1) (2008) - [c23]Rafael Murrieta-Cid
, Raúl Monroy
, Seth Hutchinson
, Jean-Paul Laumond:
A Complexity result for the pursuit-evasion game of maintaining visibility of a moving evader. ICRA 2008: 2657-2664 - 2007
- [c22]Juan Carlos López Pimentel
, Raúl Monroy, Dieter Hutter
:
On the Automated Correction of Security Protocols Susceptible to a Replay Attack. ESORICS 2007: 594-609 - 2006
- [j5]Benjamín Tovar, Lourdes Muñoz-Gómez, Rafael Murrieta-Cid
, Moises Alencastre-Miranda, Raúl Monroy
, Seth Hutchinson
:
Planning exploration strategies for simultaneous localization and mapping. Robotics Auton. Syst. 54(4): 314-331 (2006) - [c21]Fernando Godínez, Dieter Hutter
, Raúl Monroy:
On the Use of Word Networks to Mimicry Attack Detection. ETRICS 2006: 423-435 - [c20]Víctor H. García, Raúl Monroy
, Maricela Quintana
:
Web Attack Detection Using ID3. IFIP PPAI 2006: 323-332 - [c19]Anna V. Álvarez, Karen A. García, Raúl Monroy, Luis A. Trejo, Jesús Vázquez:
A Tool for Managing Security Policies in Organisations. IWSEC 2006: 378-388 - [c18]Román Posadas, J. Carlos Mex-Perera
, Raúl Monroy, Juan Arturo Nolazco-Flores:
Hybrid Method for Detecting Masqueraders Using Session Folding and Hidden Markov Models. MICAI 2006: 622-631 - [c17]Rafael Murrieta-Cid, Raúl Monroy:
A Hybrid Segmentation Method Applied to Color Images and 3D Information. MICAI 2006: 789-799 - [c16]Juan Carlos López Pimentel
, Raúl Monroy
, Dieter Hutter
:
A Method for Patching Interleaving-Replay Attacks in Faulty Security Protocols. V&D@FLoC 2006: 117-130 - 2005
- [c15]Fernando Godínez, Dieter Hutter
, Raúl Monroy:
Audit File Reduction Using N-Gram Models. Financial Cryptography 2005: 336-340 - [c14]Fernando Godínez, Dieter Hutter
, Raúl Monroy:
On the Role of Information Compaction to Intrusion Detection. ISSADS 2005: 83-97 - [c13]Rafael Murrieta-Cid
, Alejandro Sarmiento, Teja Muppirala, Seth Hutchinson
, Raúl Monroy
, Moises Alencastre-Miranda, Lourdes Muñoz-Gómez, Ricardo Swain Oropeza:
A Framework for Reactive Motion and Sensing Planning: A Critical Events-Based Approach. MICAI 2005: 990-1000 - 2004
- [j4]Raúl Monroy, Rosa Saab, Fernando Godínez:
On Modelling an Immune System. Computación y Sistemas 7(4) (2004) - [c12]Fernando Godínez, Dieter Hutter
, Raúl Monroy:
Attribute Reduction for Effective Intrusion Detection. AWIC 2004: 74-83 - [c11]Juan Carlos López Pimentel
, Raúl Monroy:
A Rippling-Based Difference Reduction Technique to Automatically Prove Security Protocol Goals. IBERAMIA 2004: 364-374 - [c10]Raúl Monroy:
A Process Algebra Model of the Immune System. KES 2004: 526-533 - [c9]Fernando Godínez, Dieter Hutter
, Raúl Monroy:
Service Discrimination and Audit File Reduction for Effective Intrusion Detection. WISA 2004: 99-113 - [e1]Raúl Monroy, Gustavo Arroyo-Figueroa, Luis Enrique Sucar, Juan Humberto Sossa Azuela:
MICAI 2004: Advances in Artificial Intelligence, Third Mexican International Conference on Artificial Intelligence, Mexico City, Mexico, April 26-30, 2004, Proceedings. Lecture Notes in Computer Science 2972, Springer 2004, ISBN 3-540-21459-3 [contents] - 2003
- [j3]Raúl Monroy
:
Predicate Synthesis for Correcting Faulty Conjectures: The Proof Planning Paradigm. Autom. Softw. Eng. 10(3): 247-269 (2003) - [c8]Raúl Monroy, Maya Carrillo:
On Automating the Formulation of Security Goals under the Inductive Approach. Applied Informatics 2003: 1020-1025 - 2002
- [c7]Rosa Saab, Raúl Monroy, Fernando Godínez:
Towards a Model for an Immune System. MICAI 2002: 401-410 - 2001
- [j2]Raúl Monroy Borja, Alan Bundy:
On the Correction of Faulty Formulae. Computación y Sistemas 5(1) (2001) - [c6]Raúl Monroy:
Concept Formation via Proof Planning Failure. LPAR 2001: 723-736 - 2000
- [j1]Raúl Monroy
, Alan Bundy, Ian Green:
Planning Proofs of Equations in CCS. Autom. Softw. Eng. 7(3): 263-304 (2000) - [c5]Raúl Monroy
:
The Use of Abduction and Recursion-Editor Techniques for the Correction of Faulty Conjectures. ASE 2000: 91-100 - [c4]Raúl Monroy
, Alan Bundy, Ian Green:
Searching for a Solution to Program Verification=Equation Solving in CCS. MICAI 2000: 1-12
1990 – 1999
- 1998
- [c3]Raúl Monroy, Alan Bundy, Ian Green:
Observant: An Annotated Term-Rewriting System for Deciding Observation Congruence. ECAI 1998: 393-397 - [c2]Raúl Monroy
, Alan Bundy, Ian Green:
Planning Equational Verification in CCS. ASE 1998: 43-52 - 1997
- [b1]Raúl Monroy Borja:
Planning proofs of correctness of CCS systems. University of Edinburgh, UK, 1997 - 1994
- [c1]Raúl Monroy, Alan Bundy, Andrew Ireland:
Proof Plans for the Correction of False Conjectures. LPAR 1994: 54-68
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-02-20 00:49 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint